Skip to content

Commit 3c029f7

Browse files
committed
[zh-cn] sync blog/2022-08-31-cgroupv2-ga.md
Signed-off-by: xin.li <[email protected]>
1 parent a65b1a3 commit 3c029f7

File tree

1 file changed

+305
-0
lines changed

1 file changed

+305
-0
lines changed
Lines changed: 305 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,305 @@
1+
---
2+
layout: blog
3+
title: "Kubernetes 1.25: cgroup v2 升级到 GA"
4+
date: 2022-08-31
5+
slug: cgroupv2-ga-1-25
6+
---
7+
8+
<!--
9+
layout: blog
10+
title: "Kubernetes 1.25: cgroup v2 graduates to GA"
11+
date: 2022-08-31
12+
slug: cgroupv2-ga-1-25
13+
-->
14+
15+
<!--
16+
**Authors:**: David Porter (Google), Mrunal Patel (Red Hat)
17+
-->
18+
**作者**: David Porter (Google), Mrunal Patel (Red Hat)
19+
20+
<!--
21+
Kubernetes 1.25 brings cgroup v2 to GA (general availability), letting the
22+
[kubelet](/docs/concepts/overview/components/#kubelet) use the latest container resource
23+
management capabilities.
24+
-->
25+
Kubernetes 1.25 将 cgroup v2 正式发布(GA),
26+
[kubelet](/zh-cn/docs/concepts/overview/components/#kubelet) 使用最新的容器资源管理能力。
27+
28+
<!--
29+
## What are cgroups?
30+
-->
31+
## 什么是 cgroup?
32+
33+
<!--
34+
Effective [resource management](/docs/concepts/configuration/manage-resources-containers/) is a
35+
critical aspect of Kubernetes. This involves managing the finite resources in
36+
your nodes, such as CPU, memory, and storage.
37+
38+
*cgroups* are a Linux kernel capability that establish resource management
39+
functionality like limiting CPU usage or setting memory limits for running
40+
processes.
41+
-->
42+
有效的[资源管理](/zh-cn/docs/concepts/configuration/manage-resources-containers/)是 Kubernetes 的一个关键方面。
43+
这涉及管理节点中的有限资源,例如 CPU、内存和存储。
44+
45+
**cgroups** 是一种可建立资源管理功能的 Linux 内核能力,
46+
例如为正在运行的进程限制 CPU 使用率或设置内存限制。
47+
48+
<!--
49+
When you use the resource management capabilities in Kubernetes, such as configuring
50+
[requests and limits for Pods and containers](/docs/concepts/configuration/manage-resources-containers/#requests-and-limits),
51+
Kubernetes uses cgroups to enforce your resource requests and limits.
52+
53+
The Linux kernel offers two versions of cgroups: cgroup v1 and cgroup v2.
54+
-->
55+
当你使用 Kubernetes 中的资源管理能力时,例如配置
56+
[Pod 和容器的请求和限制](/zh-cn/docs/concepts/configuration/manage-resources-containers/#requests-and-limits)
57+
Kubernetes 会使用 cgroups 来强制执行你的资源请求和限制。
58+
59+
Linux 内核提供了两个版本的 cgroup:cgroup v1 和 cgroup v2。
60+
61+
<!--
62+
## What is cgroup v2?
63+
-->
64+
## 什么是 cgroup v2?
65+
66+
<!--
67+
cgroup v2 is the latest version of the Linux cgroup API. cgroup v2 provides a
68+
unified control system with enhanced resource management capabilities.
69+
70+
cgroup v2 has been in development in the Linux Kernel since 2016 and in recent
71+
years has matured across the container ecosystem. With Kubernetes 1.25, cgroup
72+
v2 support has graduated to general availability.
73+
-->
74+
cgroup v2 是 Linux cgroup API 的最新版本,
75+
提供了一个具有增强的资源管理能力的统一控制系统。
76+
77+
自 2016 年以来,cgroup v2 一直在 Linux 内核中进行开发,
78+
近年来在整个容器生态系统中已经成熟。在 Kubernetes 1.25 中,
79+
对 cgroup v2 的支持已升级为正式发布。
80+
81+
<!--
82+
Many recent releases of Linux distributions have switched over to cgroup v2 by
83+
default so it's important that Kubernetes continues to work well on these new
84+
updated distros.
85+
86+
cgroup v2 offers several improvements over cgroup v1, such as the following:
87+
-->
88+
默认情况下,许多最新版本的 Linux 发行版已切换到 cgroup v2,
89+
因此 Kubernetes 继续在这些新更新的发行版上正常运行非常重要。
90+
91+
cgroup v2 对 cgroup v1 进行了多项改进,例如:
92+
93+
<!--
94+
* Single unified hierarchy design in API
95+
* Safer sub-tree delegation to containers
96+
* Newer features like [Pressure Stall Information](https://www.kernel.org/doc/html/latest/accounting/psi.html)
97+
* Enhanced resource allocation management and isolation across multiple resources
98+
* Unified accounting for different types of memory allocations (network and kernel memory, etc)
99+
* Accounting for non-immediate resource changes such as page cache write backs
100+
-->
101+
* API 中单个统一的层次结构设计
102+
* 为容器提供更安全的子树委派能力
103+
* [压力阻塞信息](https://www.kernel.org/doc/html/latest/accounting/psi.html)等新功能
104+
* 增强的资源分配管理和跨多个资源的隔离
105+
* 统一核算不同类型的内存分配(网络和内核内存等)
106+
* 考虑非即时资源更改,例如页面缓存回写
107+
108+
<!--
109+
Some Kubernetes features exclusively use cgroup v2 for enhanced resource
110+
management and isolation. For example,
111+
the [MemoryQoS feature](/blog/2021/11/26/qos-memory-resources/) improves
112+
memory utilization and relies on cgroup v2 functionality to enable it. New
113+
resource management features in the kubelet will also take advantage of the new
114+
cgroup v2 features moving forward.
115+
-->
116+
一些 Kubernetes 特性专门使用 cgroup v2 来增强资源管理和隔离。
117+
例如,[MemoryQoS 特性](/blog/2021/11/26/qos-memory-resources/)提高了内存利用率并依赖
118+
cgroup v2 功能来启用它。kubelet 中的新资源管理特性也将利用新的 cgroup v2 特性向前发展。
119+
120+
<!--
121+
## How do you use cgroup v2?
122+
123+
Many Linux distributions are switching to cgroup v2 by default; you might start
124+
using it the next time you update the Linux version of your control plane and
125+
nodes!
126+
127+
Using a Linux distribution that uses cgroup v2 by default is the recommended
128+
method. Some of the popular Linux distributions that use cgroup v2 include the
129+
following:
130+
131+
* Container Optimized OS (since M97)
132+
* Ubuntu (since 21.10)
133+
* Debian GNU/Linux (since Debian 11 Bullseye)
134+
* Fedora (since 31)
135+
* Arch Linux (since April 2021)
136+
* RHEL and RHEL-like distributions (since 9)
137+
-->
138+
## 如何使用 cgroup v2?
139+
140+
许多 Linux 发行版默认切换到 cgroup v2;
141+
你可能会在下次更新控制平面和节点的 Linux 版本时开始使用它!
142+
143+
推荐使用默认使用 cgroup v2 的 Linux 发行版。
144+
一些使用 cgroup v2 的流行 Linux 发行版包括:
145+
146+
* Container-Optimized OS(从 M97 开始)
147+
* Ubuntu(从 21.10 开始,推荐 22.04+)
148+
* Debian GNU/Linux(从 Debian 11 Bullseye 开始)
149+
* Fedora(从 31 开始)
150+
* Arch Linux(从 2021 年 4 月开始)
151+
* RHEL 和类似 RHEL 的发行版(从 9 开始)
152+
153+
<!--
154+
To check if your distribution uses cgroup v2 by default,
155+
refer to [Check your cgroup version](/docs/concepts/architecture/cgroups/#check-cgroup-version) or
156+
consult your distribution's documentation.
157+
158+
If you're using a managed Kubernetes offering, consult your provider to
159+
determine how they're adopting cgroup v2, and whether you need to take action.
160+
161+
To use cgroup v2 with Kubernetes, you must meet the following requirements:
162+
-->
163+
要检查你的发行版是否默认使用 cgroup v2,
164+
请参阅你的发行版文档或遵循[识别 Linux 节点上的 cgroup 版本](/zh-cn/docs/concepts/architecture/cgroups/#check-cgroup-version)
165+
166+
如果你使用的是托管 Kubernetes 产品,请咨询你的提供商以确定他们如何采用 cgroup v2,
167+
以及你是否需要采取行动。
168+
169+
要将 cgroup v2 与 Kubernetes 一起使用,必须满足以下要求:
170+
171+
<!--
172+
* Your Linux distribution enables cgroup v2 on kernel version 5.8 or later
173+
* Your container runtime supports cgroup v2. For example:
174+
* [containerd](https://containerd.io/) v1.4 or later
175+
* [cri-o](https://cri-o.io/) v1.20 or later
176+
* The kubelet and the container runtime are configured to use the [systemd cgroup driver](/docs/setup/production-environment/container-runtimes#systemd-cgroup-driver)
177+
-->
178+
* 你的 Linux 发行版在内核版本 5.8 或更高版本上启用 cgroup v2
179+
* 你的容器运行时支持 cgroup v2。例如:
180+
* [containerd](https://containerd.io/) v1.4 或更高版本
181+
* [cri-o](https://cri-o.io/) v1.20 或更高版本
182+
* kubelet 和容器运行时配置为使用 [systemd cgroup 驱动程序](/zh-cn/docs/setup/production-environment/container-runtimes#systemd-cgroup-driver)
183+
184+
<!--
185+
The kubelet and container runtime use a [cgroup driver](/docs/setup/production-environment/container-runtimes#cgroup-drivers)
186+
to set cgroup paramaters. When using cgroup v2, it's strongly recommended that both
187+
the kubelet and your container runtime use the
188+
[systemd cgroup driver](/docs/setup/production-environment/container-runtimes#systemd-cgroup-driver),
189+
so that there's a single cgroup manager on the system. To configure the kubelet
190+
and the container runtime to use the driver, refer to the
191+
[systemd cgroup driver documentation](/docs/setup/production-environment/container-runtimes#systemd-cgroup-driver).
192+
-->
193+
kubelet 和容器运行时使用 [cgroup 驱动](/zh-cn/docs/setup/production-environment/container-runtimes#cgroup-drivers)
194+
来设置 cgroup 参数。使用 cgroup v2 时,强烈建议 kubelet 和你的容器运行时都使用
195+
[systemd cgroup 驱动程序](/zh-cn/docs/setup/production-environment/container-runtimes#systemd-cgroup-driver)
196+
以便系统上只有一个 cgroup 管理员。要配置 kubelet 和容器运行时以使用该驱动程序,
197+
请参阅 [systemd cgroup 驱动程序文档](/zh-cn/docs/setup/production-environment/container-runtimes#systemd-cgroup-driver)
198+
199+
<!--
200+
## Migrate to cgroup v2
201+
202+
When you run Kubernetes with a Linux distribution that enables cgroup v2, the
203+
kubelet should automatically adapt without any additional configuration
204+
required, as long as you meet the requirements.
205+
206+
In most cases, you won't see a difference in the user experience when you
207+
switch to using cgroup v2 unless your users access the cgroup file system
208+
directly.
209+
-->
210+
## 迁移到 cgroup v2
211+
212+
当你使用启用 cgroup v2 的 Linux 发行版运行 Kubernetes 时,只要你满足要求,
213+
kubelet 应该会自动适应而无需任何额外的配置。
214+
215+
在大多数情况下,除非你的用户直接访问 cgroup 文件系统,
216+
否则当你切换到使用 cgroup v2 时,不会看到用户体验有什么不同。
217+
218+
<!--
219+
If you have applications that access the cgroup file system directly, either on
220+
the node or from inside a container, you must update the applications to use
221+
the cgroup v2 API instead of the cgroup v1 API.
222+
223+
Scenarios in which you might need to update to cgroup v2 include the following:
224+
225+
* If you run third-party monitoring and security agents that depend on the cgroup file system, update the
226+
agents to versions that support cgroup v2.
227+
* If you run [cAdvisor](https://github.com/google/cadvisor) as a stand-alone
228+
DaemonSet for monitoring pods and containers, update it to v0.43.0 or later.
229+
* If you deploy Java applications with the JDK, prefer to use JDK 11.0.16 and
230+
later or JDK 15 and later, which [fully support cgroup v2](https://bugs.openjdk.org/browse/JDK-8230305).
231+
-->
232+
如果你在节点上或从容器内直接访问 cgroup 文件系统的应用程序,
233+
你必须更新应用程序以使用 cgroup v2 API 而不是 cgroup v1 API。
234+
235+
你可能需要更新到 cgroup v2 的场景包括:
236+
237+
* 如果你运行依赖于 cgroup 文件系统的第三方监控和安全代理,请将代理更新到支持 cgroup v2 的版本。
238+
* 如果你将 [cAdvisor](https://github.com/google/cadvisor) 作为独立的 DaemonSet 运行以监控 Pod 和容器,
239+
请将其更新到 v0.43.0 或更高版本。
240+
* 如果你使用 JDK 部署 Java 应用程序,首选使用[完全支持 cgroup v2](https://bugs.openjdk.org/browse/JDK-8230305)
241+
的 JDK 11.0.16 及更高版本或 JDK 15 及更高版本。
242+
243+
<!--
244+
## Learn more
245+
246+
* Read the [Kubernetes cgroup v2 documentation](/docs/concepts/architecture/cgroups/)
247+
* Read the enhancement proposal, [KEP 2254](https://github.com/kubernetes/enhancements/blob/master/keps/sig-node/2254-cgroup-v2/README.md)
248+
* Learn more about
249+
[cgroups](https://man7.org/linux/man-pages/man7/cgroups.7.html) on Linux Manual Pages
250+
and [cgroup v2](https://docs.kernel.org/admin-guide/cgroup-v2.html) on the Linux Kernel documentation
251+
-->
252+
## 进一步了解
253+
254+
* 阅读 [Kubernetes cgroup v2 文档](/zh-cn/docs/concepts/architecture/cgroups/)
255+
* 阅读增强提案 [KEP 2254](https://github.com/kubernetes/enhancements/blob/master/keps/sig-node/2254-cgroup-v2/README.md)
256+
* 学习更多关于 Linux 手册页上的 [cgroups](https://man7.org/linux/man-pages/man7/cgroups.7.html) 和 Linux 内核文档上的
257+
[cgroup v2](https://docs.kernel.org/admin-guide/cgroup-v2.html)
258+
259+
<!--
260+
## Get involved
261+
262+
Your feedback is always welcome! SIG Node meets regularly and are available in
263+
the `#sig-node` channel in the Kubernetes [Slack](https://slack.k8s.io/), or
264+
using the SIG [mailing list](https://github.com/kubernetes/community/tree/master/sig-node#contact).
265+
266+
cgroup v2 has had a long journey and is a great example of open source
267+
community collaboration across the industry because it required work across the
268+
stack, from the Linux Kernel to systemd to various container runtimes, and (of
269+
course) Kubernetes.
270+
-->
271+
## 参与其中
272+
273+
随时欢迎你的反馈!SIG Node 定期开会,可在 Kubernetes [Slack](https://slack.k8s.io/)
274+
`#sig-node` 频道中获得,或使用 SIG [邮件列表](https://github.com/kubernetes/community/tree/master/sig-node#contact)
275+
276+
cgroup v2 经历了漫长的旅程,是整个行业开源社区协作的一个很好的例子,
277+
因为它需要跨堆栈的工作,从 Linux 内核到 systemd 到各种容器运行时,当然还有 Kubernetes。
278+
279+
<!--
280+
## Acknowledgments
281+
282+
We would like to thank [Giuseppe Scrivano](https://github.com/giuseppe) who
283+
initiated cgroup v2 support in Kubernetes, and reviews and leadership from the
284+
SIG Node community including chairs [Dawn Chen](https://github.com/dchen1107)
285+
and [Derek Carr](https://github.com/derekwaynecarr).
286+
287+
We'd also like to thank the maintainers of container runtimes like Docker,
288+
containerd and CRI-O, and the maintainers of components like
289+
[cAdvisor](https://github.com/google/cadvisor)
290+
and [runc, libcontainer](https://github.com/opencontainers/runc),
291+
which underpin many container runtimes. Finally, this wouldn't have been
292+
possible without support from systemd and upstream Linux Kernel maintainers.
293+
294+
It's a team effort!
295+
-->
296+
## 致谢
297+
298+
我们要感谢 [Giuseppe Scrivano](https://github.com/giuseppe) 在 Kubernetes 中发起对 cgroup v2 的支持,
299+
还要感谢 SIG Node 社区主席 [Dawn Chen](https://github.com/dchen1107)
300+
[Derek Carr](https://github.com/derekwaynecarr) 所作的审查和领导工作。
301+
302+
我们还要感谢 Docker、containerd 和 CRI-O 等容器运行时的维护者,
303+
以及支持多种容器运行时的 [cAdvisor](https://github.com/google/cadvisor)
304+
[runc, libcontainer](https://github.com/opencontainers/runc) 等组件的维护者。
305+
最后,如果没有 systemd 和上游 Linux 内核维护者的支持,这将是不可能的。

0 commit comments

Comments
 (0)